{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:40Z","timestamp":1750220680852,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Horizon 2020 LOCARD","award":["Grant Agreement no. 832735"],"award-info":[{"award-number":["Grant Agreement no. 832735"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447829","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"221-232","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Contact Tracing Made Un-relay-able"],"prefix":"10.1145","author":[{"given":"Marco","family":"Casagrande","sequence":"first","affiliation":[{"name":"University of Padua, Padua, Italy"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua, Padua, Italy"}]},{"given":"Eleonora","family":"Losiouk","sequence":"additional","affiliation":[{"name":"University of Padua, Padua, Italy"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Apple and Google. 2020. Exposure Notification System. https:\/\/covid19.apple.com\/contacttracing  Apple and Google. 2020. Exposure Notification System. https:\/\/covid19.apple.com\/contacttracing"},{"key":"e_1_3_2_2_2_1","unstructured":"G. Avitabile V. Botta V. Iovino and I. Visconti. 2020. Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System. Cryptology ePrint Archive Report 2020\/493. https:\/\/eprint.iacr.org\/2020\/493  G. Avitabile V. Botta V. Iovino and I. Visconti. 2020. Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System. Cryptology ePrint Archive Report 2020\/493. https:\/\/eprint.iacr.org\/2020\/493"},{"key":"e_1_3_2_2_3_1","unstructured":"J. Bay J. Kek A. Tan C.S. Hau L. Yongquan J. Tan and T.A. Quy. 2020. BlueTrace: A privacy-preserving protocol for community-driven contact tracing across borders. https:\/\/bluetrace.io\/static\/bluetrace_whitepaper-938063656596c104632def383eb33b3c.pdf  J. Bay J. Kek A. Tan C.S. Hau L. Yongquan J. Tan and T.A. Quy. 2020. BlueTrace: A privacy-preserving protocol for community-driven contact tracing across borders. https:\/\/bluetrace.io\/static\/bluetrace_whitepaper-938063656596c104632def383eb33b3c.pdf"},{"key":"e_1_3_2_2_4_1","unstructured":"Prime Minister's Office Bending Spoons. 2020. Immuni. https:\/\/www.immuni.italia.it\/  Prime Minister's Office Bending Spoons. 2020. Immuni. https:\/\/www.immuni.italia.it\/"},{"volume-title":"2013 International Conference on Risks and Security of Internet and Systems. IEEE, la Rochelle, France, 1--9.","author":"Canlar E. S.","key":"e_1_3_2_2_5_1","unstructured":"E. S. Canlar , M. Conti , B. Crispo , and R. Di Pietro . 2013. CREPUSCOLO: A collusion resistant privacy preserving location verification system . In 2013 International Conference on Risks and Security of Internet and Systems. IEEE, la Rochelle, France, 1--9. E. S. Canlar, M. Conti, B. Crispo, and R. Di Pietro. 2013. CREPUSCOLO: A collusion resistant privacy preserving location verification system. In 2013 International Conference on Risks and Security of Internet and Systems. IEEE, la Rochelle, France, 1--9."},{"key":"e_1_3_2_2_6_1","volume":"201","author":"Damasevicius R.","unstructured":"R. Damasevicius , G. Ziberkas , V. Stuikys , and J. Toldinas. 201 2. Energy Consumption of Hash Functions. Elektronika ir Elektrotechnika, Vol. 18 (12 2012), 81--84. https:\/\/doi.org\/10.5755\/j01.eee.18.10.3069 R. Damasevicius, G. Ziberkas, V. Stuikys, and J. Toldinas. 2012. Energy Consumption of Hash Functions. Elektronika ir Elektrotechnika, Vol. 18 (12 2012), 81--84. https:\/\/doi.org\/10.5755\/j01.eee.18.10.3069","journal-title":"J. Toldinas."},{"key":"e_1_3_2_2_7_1","unstructured":"S. Deb. 2020. Privacy prescriptions for technology interventions on Covid-19 in India. https:\/\/drive.google.com\/file\/d\/1UK5rElhcdP5T3Y-8fYP6cCgQKKpQBeOX\/view?usp=sharing  S. Deb. 2020. Privacy prescriptions for technology interventions on Covid-19 in India. https:\/\/drive.google.com\/file\/d\/1UK5rElhcdP5T3Y-8fYP6cCgQKKpQBeOX\/view?usp=sharing"},{"key":"e_1_3_2_2_8_1","volume":"202","author":"Dehaye P.O.","unstructured":"P.O. Dehaye and J. Reardon. 202 0. SwissCovid: a critical analysis of risk assessment by Swiss authorities. arxiv: 2006.10719 https:\/\/arxiv.org\/pdf\/2006.10719.pdf P.O. Dehaye and J. Reardon. 2020. SwissCovid: a critical analysis of risk assessment by Swiss authorities. arxiv: 2006.10719 https:\/\/arxiv.org\/pdf\/2006.10719.pdf","journal-title":"J. Reardon."},{"key":"e_1_3_2_2_9_1","unstructured":"National Institute for Research in Digital Science and Technology (France). 2020. StopCovid. https:\/\/www.inria.fr\/en\/le_projet_stopcovid  National Institute for Research in Digital Science and Technology (France). 2020. StopCovid. https:\/\/www.inria.fr\/en\/le_projet_stopcovid"},{"key":"e_1_3_2_2_10_1","volume":"202","author":"Galanopoulos A.","unstructured":"A. Galanopoulos , V. Valls , G. Iosifidis , and D. J. Leith. 202 0. Measurement-driven Analysis of an Edge-Assisted Object Recognition System. In IEEE International Conference on Communications. IEEE, Virtual Conference, 1--7. A. Galanopoulos, V. Valls, G. Iosifidis, and D. J. Leith. 2020. Measurement-driven Analysis of an Edge-Assisted Object Recognition System. In IEEE International Conference on Communications. IEEE, Virtual Conference, 1--7.","journal-title":"J. Leith."},{"volume-title":"2020 USENIX Annual Technical Conference. USENIX Association, Virtual Conference, 911--925","author":"Garbelini M. E.","key":"e_1_3_2_2_11_1","unstructured":"M. E. Garbelini , C. Wang , S. Chattopadhyay , S. Sumei , and E. Kurniawan . 2020. SweynTooth: Unleashing Mayhem over Bluetooth Low Energy . In 2020 USENIX Annual Technical Conference. USENIX Association, Virtual Conference, 911--925 . https:\/\/www.usenix.org\/conference\/atc20\/presentation\/garbelini M. E. Garbelini, C. Wang, S. Chattopadhyay, S. Sumei, and E. Kurniawan. 2020. SweynTooth: Unleashing Mayhem over Bluetooth Low Energy. In 2020 USENIX Annual Technical Conference. USENIX Association, Virtual Conference, 911--925. https:\/\/www.usenix.org\/conference\/atc20\/presentation\/garbelini"},{"key":"e_1_3_2_2_12_1","unstructured":"Indria and Fraunhofer AISEC. 2020. ROBERT protocol. https:\/\/github.com\/ROBERT-proximity-tracing\/documents  Indria and Fraunhofer AISEC. 2020. ROBERT protocol. https:\/\/github.com\/ROBERT-proximity-tracing\/documents"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"D. Leith and S. Farrell. 2020. Contact Tracing App Privacy: What Data Is Shared By Europe's GAEN Contact Tracing Apps? (2020). https:\/\/www.scss.tcd.ie\/Doug.Leith\/pubs\/contact_tracing_app_traffic.pdf  D. Leith and S. Farrell. 2020. Contact Tracing App Privacy: What Data Is Shared By Europe's GAEN Contact Tracing Apps? (2020). https:\/\/www.scss.tcd.ie\/Doug.Leith\/pubs\/contact_tracing_app_traffic.pdf","DOI":"10.1109\/INFOCOM42981.2021.9488728"},{"key":"e_1_3_2_2_14_1","unstructured":"P. Madhusudan P. Miao L. Ren and V.N. Venkatakrishnan. 2020. Privacy-Preserving Secure Contact Tracing ConTraIL Project. https:\/\/github.com\/ConTraILProtocols\/documents\/blob\/master\/ContrailWhitePaper.pdf.  P. Madhusudan P. Miao L. Ren and V.N. Venkatakrishnan. 2020. Privacy-Preserving Secure Contact Tracing ConTraIL Project. https:\/\/github.com\/ConTraILProtocols\/documents\/blob\/master\/ContrailWhitePaper.pdf."},{"key":"e_1_3_2_2_15_1","unstructured":"Israel Ministry of Health. 2020. Hamagen. https:\/\/govextra.gov.il\/ministry-of-health\/hamagen-app\/download-en\/  Israel Ministry of Health. 2020. Hamagen. https:\/\/govextra.gov.il\/ministry-of-health\/hamagen-app\/download-en\/"},{"key":"e_1_3_2_2_16_1","unstructured":"NYS Department of Health Privacy Policy. 2020. Covid Alert NY. https:\/\/coronavirus.health.ny.gov\/covid-alert-ny\/  NYS Department of Health Privacy Policy. 2020. Covid Alert NY. https:\/\/coronavirus.health.ny.gov\/covid-alert-ny\/"},{"key":"e_1_3_2_2_17_1","unstructured":"Government of India. 2020. Aarogya Setu. https:\/\/aarogyasetu.gov.in\/  Government of India. 2020. Aarogya Setu. https:\/\/aarogyasetu.gov.in\/"},{"key":"e_1_3_2_2_18_1","unstructured":"Government of Ireland. 2020. Covid Tracker. https:\/\/www2.hse.ie\/conditions\/coronavirus\/testing\/contact-tracing.html  Government of Ireland. 2020. Covid Tracker. https:\/\/www2.hse.ie\/conditions\/coronavirus\/testing\/contact-tracing.html"},{"key":"e_1_3_2_2_19_1","unstructured":"Switzerland Federal Office of Public Health. 2020. SwissCovid. https:\/\/www.bag.admin.ch\/bag\/en\/home\/krankheiten\/ausbrueche-epidemien-pandemien\/aktuelle-ausbrueche-epidemien\/novel-cov\/swisscovid-app-und-contact-tracing.html  Switzerland Federal Office of Public Health. 2020. SwissCovid. https:\/\/www.bag.admin.ch\/bag\/en\/home\/krankheiten\/ausbrueche-epidemien-pandemien\/aktuelle-ausbrueche-epidemien\/novel-cov\/swisscovid-app-und-contact-tracing.html"},{"key":"e_1_3_2_2_20_1","unstructured":"Government of Singapore. 2020. BlueTrace. https:\/\/bluetrace.io\/  Government of Singapore. 2020. BlueTrace. https:\/\/bluetrace.io\/"},{"key":"e_1_3_2_2_21_1","unstructured":"Government of the Hong Kong Special Administrative Region. 2020. \"StayHomeSafe\" Mobile App User Guide. https:\/\/www.coronavirus.gov.hk\/eng\/stay-home-safe.html  Government of the Hong Kong Special Administrative Region. 2020. \"StayHomeSafe\" Mobile App User Guide. https:\/\/www.coronavirus.gov.hk\/eng\/stay-home-safe.html"},{"key":"e_1_3_2_2_22_1","unstructured":"PEPP-PT. 2020. PEPP-PT. https:\/\/github.com\/pepp-pt  PEPP-PT. 2020. PEPP-PT. https:\/\/github.com\/pepp-pt"},{"key":"e_1_3_2_2_23_1","unstructured":"B. Perrigo. 2020. U.S. States Are Rolling Out COVID-19 Contact Tracing Apps. Months of Evidence From Europe Shows They're No Silver Bullet. https:\/\/time.com\/5898559\/covid-19-contact-tracing-apps-privacy\/  B. Perrigo. 2020. U.S. States Are Rolling Out COVID-19 Contact Tracing Apps. Months of Evidence From Europe Shows They're No Silver Bullet. https:\/\/time.com\/5898559\/covid-19-contact-tracing-apps-privacy\/"},{"key":"e_1_3_2_2_24_1","volume-title":"Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing. Cryptology ePrint Archive, Report 2020\/418. https:\/\/eprint.iacr.org\/2020\/418.","author":"Pietrzak K.","year":"2020","unstructured":"K. Pietrzak . 2020 . Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing. Cryptology ePrint Archive, Report 2020\/418. https:\/\/eprint.iacr.org\/2020\/418. K. Pietrzak. 2020. Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing. Cryptology ePrint Archive, Report 2020\/418. https:\/\/eprint.iacr.org\/2020\/418."},{"key":"e_1_3_2_2_25_1","volume":"202","author":"Raskar R.","unstructured":"R. Raskar , I. Schunemann , R. Barbar , K. Vilcans , J. Gray , P. Vepakomma , S. Kapa , A. Nuzzo , R. Gupta , A. Berke , D. Greenwood , C. Keegan , S. Kanaparti , R. Beaudry , D. Stansbury , B. Botero Arcila , R. Kanaparti , V. Pamplona , F.M. Benedetti , A. Clough , R. Das , K. Jain , K. Louisy , G. Nadeau , V. Pamplona , S. Penrod , Y. Rajaee , A. Singh , G. Storm , and J. Werner. 202 0. Apps Gone Rogue: Maintaining Personal Privacy in an Epidemic. arxiv: 2003.08567 [cs.CR] R. Raskar, I. Schunemann, R. Barbar, K. Vilcans, J. Gray, P. Vepakomma, S. Kapa, A. Nuzzo, R. Gupta, A. Berke, D. Greenwood, C. Keegan, S. Kanaparti, R. Beaudry, D. Stansbury, B. Botero Arcila, R. Kanaparti, V. Pamplona, F.M. Benedetti, A. Clough, R. Das, K. Jain, K. Louisy, G. Nadeau, V. Pamplona, S. Penrod, Y. Rajaee, A. Singh, G. Storm, and J. Werner. 2020. Apps Gone Rogue: Maintaining Personal Privacy in an Epidemic. arxiv: 2003.08567 [cs.CR]","journal-title":"J. Werner."},{"key":"e_1_3_2_2_26_1","unstructured":"C. Troncoso M. Payer J.P. Hubaux M. Salath\u00e9 J. Larus E. Bugnion W. Lueks T. Stadler A. Pyrgelis D. Antonioli L. Barman S. Chatel K. Paterson S. Capkun D. Basin J. Beutel D. Jackson B. Preneel N. Smart D. Singelee A. Abidin S. G\u00fcrses M. Veale C. Cremers M. Backes N. Ole Tippenhauer R. Binns C. Cattuto A. Barrat G. Persiano D. Fiore M. Barbosa and D. Boneh. 2020. DP3T - Decentralized Privacy-Preserving Proximity Tracing. https:\/\/github.com\/DP-3T\/documents  C. Troncoso M. Payer J.P. Hubaux M. Salath\u00e9 J. Larus E. Bugnion W. Lueks T. Stadler A. Pyrgelis D. Antonioli L. Barman S. Chatel K. Paterson S. Capkun D. Basin J. Beutel D. Jackson B. Preneel N. Smart D. Singelee A. Abidin S. G\u00fcrses M. Veale C. Cremers M. Backes N. Ole Tippenhauer R. Binns C. Cattuto A. Barrat G. Persiano D. Fiore M. Barbosa and D. Boneh. 2020. DP3T - Decentralized Privacy-Preserving Proximity Tracing. https:\/\/github.com\/DP-3T\/documents"},{"volume-title":"21st IEEE International Conference on Mobile Data Management. IEEE","author":"Zeinalipour-Yazti D.","key":"e_1_3_2_2_29_1","unstructured":"D. Zeinalipour-Yazti and C. Claramunt . 2020. COVID-19 Mobile Contact Tracing Apps (MCTA): A Digital Vaccine or a Privacy Demolition? . In 21st IEEE International Conference on Mobile Data Management. IEEE , Versailles, France. D. Zeinalipour-Yazti and C. Claramunt. 2020. COVID-19 Mobile Contact Tracing Apps (MCTA): A Digital Vaccine or a Privacy Demolition?. In 21st IEEE International Conference on Mobile Data Management. IEEE, Versailles, France."}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447829","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447829"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":27,"alternative-id":["10.1145\/3422337.3447829","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447829","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}